General
-
Target
test.bat
-
Size
370B
-
Sample
230523-pwbskafc46
-
MD5
1157be1803e2f740eec3a0c69aa44625
-
SHA1
5963efa7895a6748e74f0aeb94a3b3856787b8c5
-
SHA256
42c77f89ea1a298098ecf3e8939f6c5ccd005742d0482047ee26fbf56728c684
-
SHA512
04d698560789eb87f9fdbc32468557d05655558d289749f263fba4cdeb26b1cf83c214c316d60184856a935a9da757a62c361ca8e41804b59606a068a18f3899
Static task
static1
Behavioral task
behavioral1
Sample
test.bat
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
test.bat
Resource
win10v2004-20230220-en
Malware Config
Extracted
https://raw.githubusercontent.com/SteavenToolBox/Windows/main/Scripts/runtime.ps1
Targets
-
-
Target
test.bat
-
Size
370B
-
MD5
1157be1803e2f740eec3a0c69aa44625
-
SHA1
5963efa7895a6748e74f0aeb94a3b3856787b8c5
-
SHA256
42c77f89ea1a298098ecf3e8939f6c5ccd005742d0482047ee26fbf56728c684
-
SHA512
04d698560789eb87f9fdbc32468557d05655558d289749f263fba4cdeb26b1cf83c214c316d60184856a935a9da757a62c361ca8e41804b59606a068a18f3899
Score10/10-
Modifies boot configuration data using bcdedit
-
Blocklisted process makes network request
-
Stops running service(s)
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-